InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Taking a Zero Trust Approach to Malware

Presented by

James Coker, Infosecurity Magazine | Alex Tasker, Forcepoint | Paul Holland, ISF | Phil Robinson, Prism Infosec

About this talk

Malware-based attacks are growing in prevalence and sophistication and are increasingly difficult for organizations to tackle. Anti-malware and sandbox technologies have long been status quo, but cracks are beginning to show in this environment. Detection-based solutions struggle with emerging, unknown threats, and sandboxes can slow system performance and negatively impact user productivity. Therefore, it is essential that organizations shift from a detection to prevention model and apply a Zero Trust principle to malware protection. One such approach, Zero Trust Content Disarm & Reconstruction (CDR), deconstructs data such as PDFs, files, and images to remove threats, and then reconstructs them entirely into brand-new, pixel-perfect, fully revisited data in near real-time, all before a user opens them. In this webinar, an expert panel will discuss current challenges in dealing with malware-based attacks and how new approaches such as Zero Trust CDR have the potential to radically transform security in sectors like finance. Join this session to find out: - How malware threats are evolving, and the drawbacks of current security approaches - How to shift to the Zero Trust principle in malware protection - How to prevent the next big cyber-attack in sectors like finance
Forcepoint Data-First Cybersecurity

Forcepoint Data-First Cybersecurity

44813 subscribers316 talks
Strategic sessions exploring the future of data security
Today’s security challenges begin and end with data. In this channel, Forcepoint experts share insights into how organizations can protect sensitive information across cloud, network and on-prem environments while enabling productivity everywhere. From uncovering hidden risks with Data Risk Assessments to building stronger compliance strategies, you’ll learn how to put data at the center of your security program. Watch our sessions to discover how Forcepoint is helping CISOs, security leaders and practitioners reduce risk, simplify operations and strengthen trust in the age of AI and cloud transformation.
Related topics